Analysis
-
max time kernel
122s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 13:05
Static task
static1
Behavioral task
behavioral1
Sample
400397cba9abba0d80dd4aacf698143f_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
400397cba9abba0d80dd4aacf698143f_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
400397cba9abba0d80dd4aacf698143f_JaffaCakes118.html
-
Size
9KB
-
MD5
400397cba9abba0d80dd4aacf698143f
-
SHA1
2c75ee75889e73632eb21a8b444032cb9591383f
-
SHA256
b74b60fa634d659daaef2781ea289771cdbaabfafd962ad4d387c0d9325cb2ce
-
SHA512
74ed230cb500c01643b8855267270057e9608a2643d1cd46f0450f28e74be4619e7bbd823b5581bbbd7fea938b277c5e9113c91912ea0dd3434d2806b432da06
-
SSDEEP
96:uzVs+ux7DpLLY1k9o84d12ef7CSTUFGT/kwjjhpxlVHcEZ7ru7f:csz7DpAYS/gSxPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 102603bb701ddb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434986630" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E54B55F1-8963-11EF-BFDF-52AA2C275983} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b131900000000020000000000106600000001000020000000c058e08abb6a959cc46dcc919e18188da6b4838abfc92539d3a7829f8d4027fb000000000e80000000020000200000004e25e8d2a49dbc0768c5a2a67ea347422cbedd80bce64d2ceb6cc5b87bbcb32a20000000e8e9fc896572fd8f2b995f9f32fd90db212ccb0ab7bddb778999c29c0585808140000000964cae045d4dc595cac8053c7e19f4cb20d1b3adfecc3487eadfa7efaa18be4151b356b530c686690068c037fda7bb6b5431fae130f4c1c491248b374f110e21 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2092 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2092 iexplore.exe 2092 iexplore.exe 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2092 wrote to memory of 2776 2092 iexplore.exe 30 PID 2092 wrote to memory of 2776 2092 iexplore.exe 30 PID 2092 wrote to memory of 2776 2092 iexplore.exe 30 PID 2092 wrote to memory of 2776 2092 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\400397cba9abba0d80dd4aacf698143f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2092 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e743a71f9a3c9fa5b2cc72d04b38e26
SHA16d8d6c3909357b3def298317f3a2dc2197d7285e
SHA2563c1d272fdd184d85f3000750a1172d979278eb3ce9847752e2415d8be3cc1911
SHA512a92cb157bd3fb57c32a2cb0d8888fd843423878accea06799645dce33bff2922f0ffba252bb422c33c1825a9cb61cfbeba1b6519ba4b9bd18d8be0bbbe8456b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c9d4f5cd9cadd207554bb22714a677f
SHA14886d9fffbf0af25487525f809381c06134fd724
SHA2566a98008c7bc19332ac8d95d31f00a0faf8ee9828f89b0961c893ad1e67748414
SHA512726e1c975ae4332fc9ff42efb828af7600e78117f891aa40f0b8c5d580becbd873200b10e9a2f5e27f13a7f5b87a3bddf329bc6fbe03289dffe43ef3b0255815
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f30a20ee10967f38ffa6faa545f2ff5f
SHA1993987065880d4dd14712aebeb138559676b325f
SHA2563ba6d4792c36ac916c029e458154fb67fdf0b823e52846ef453115d5f00914a0
SHA51268a5313e180288ec18e0e1dcca9202e8b937e31140d6623f82c2097fef478aeb854028da5a84006a9dae8ea35c2ea0d67c57fcff99933d96c7bdefd5a8d8a356
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc7c02fa11cb87b622052a3c392d8de9
SHA1020f10ed306313eccfe093226a825996bc3b8a47
SHA256d4f85f3ce3c806bb87d02642eb494516d37210303aa81a9f4b1427b043345cfc
SHA51267b2feaf51805a9ba2d649a81173a80435a57dd0a67c82eed9680e2280ae218eff50cb8d490f391cf2ed90c5c673d58e98baafeacc0a1500412d4636b2ca40a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57de27bcd9018d47d48c67fddd1490235
SHA1a6d496b82b52674fc7d02c77ea2789794be65af6
SHA25697c92306bf4fa10b10f994625dced145cd599cb1a9d719c9090621bf8777d610
SHA512aad5875c0e01ed5eea0a901ab374f02ff0a1a1b74cef8877be1a7fcef039491deae38b83b9bf7bdc5e8108b787c051069aa921fdb9c0e1bfd5ea0619b92d972e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c8acc4b6bf7f9a358b98250009b3894
SHA11aee567c21469652cd97eff53c1172de63709923
SHA256dd6aa42891c8e3431d567d4a4db773c0b02a62b7395e208f95decb730cba0b71
SHA512df0573847be521071353840700a30434fce2534cc11361e8535292445b5885b69dc89dd0b9bc97a8ff23818c32c9928713b56c06db93d85e1018cfd858d8177d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c2f9e66d74b549e6ceb7f702da5c5f3
SHA19387255529f5e7af973c25e69b5f893c0fdc5cc3
SHA256e05ae937706f686e8c53c8e6bd60932cec44bf4a4c5e1c3045e1d2c1240cd74b
SHA512c427665d953bcb100402a4888c2a1c1ef395d3618a7b8e45cba22f5733133a3e510bb19257e90894a6a020afc08ad8448704cfb03134540a1fde23c41c4cb0e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1e4cbb1ae6105a188135cd318a563a7
SHA173e2467439d5660e16de1201c19c3c6135793516
SHA256653ff2e1b28b56560c395b4119cefaf586079eef8294f9051322260b07e42dd9
SHA512df4c80ce463d66e58213a13d9eb4f1178c90ad91275fcacd078d61cfbdcbfb77276fba8f9583c633016745d1a82f6cbc4de6dd541656df37ee4f44288fb69e93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593cb7705c8752fc2637af7a79faf77f6
SHA11a4f0a79af7627f082cb43f2ba2c0f76fc3fce49
SHA256c0567ad29a1b47d68a1039ce2f3ad8708cdcd72ce214339eeafd9603158fc3d8
SHA5126953a596b3664720c09e40a3902c9f734c2dd31db855f44dde8aefedb34086a050ff30c925761cc9691c7b750f9b34a0a92e6bf75801db4b89df32a3a637e49a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4d9822f2990d635d79298449b08cfac
SHA1af7d0e2b32fe4431fdc62c6aea3c1490ace157e0
SHA256f9461bb0831c2679401a495e51a505b7ff6dda1c1e76064cccfa7bd274a76a4f
SHA5124da895e1c2fc71dd4cb658fdff621484c5c3dcb0e77f6a92c74893a4e2e791fcb5f8063aea7e6399771b66808e0a6d58f3da2303faa0cedd8e67d9e5a444cbb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f98209909086e47e3af415e83f7df3b5
SHA1ffbbbca78fc0c718c8830af92116766b23dbdb57
SHA25608e93a5beb29d4b895d0cb13d1f5b5d740a9b800c5a3115dd76072e658c6186f
SHA51225c27d5144b8e431a1d877cac861f6e0eecf57e4388f3306d73a57cb7152a385a480e886f0ea1841cd9d87b3783cddd2e8168eb4b6a981f63050cb5b508676ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e125eec4a7f430d4ffd5575a0b9061fb
SHA17d98f89bd1e62a5e17553cd492a6b11923430ef5
SHA256b5fadc686c48594a049a8ae180464ed70d87cd6b8fdae30f1a404cf2b1a8d85c
SHA51263b47557c37015661b19ecee3e2bc056826435048320ad96b0c2f069c664072148dbc6e5eab37ea4421154767b24158c3805e994f664fb045c420ebbba6c9510
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5567174c581e8249177646263f7e7b3e8
SHA1ba82547d26bd85a15a231a5dde5ebdb676cdad81
SHA2566b62c00fde92f5f63db0bd3f08cf354d9699a894527d1c000c3224548c36fb3d
SHA512640531bad7dc92b0602f273f7306b47784bf9124d27418f5b65d3c35b9534c5c42c53d15dd4602fff8b26f32e4bc508118da9fae8c6c14e24a35759442de00e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2696f47ceeb9a29e75d09fa4beb34f8
SHA19df0cf9bb2391c617c47c438567b2ded308b60be
SHA256a78d356751eb49c6ed37b2451ec73b487f88062d916c1d37acbc5c479edb2ee3
SHA512dda3215d413a191e1e2491456182eb1993167b0e3f32a1f8fcd795d859347a8c978682af66f8efb85e6ca8a0eb5cc783231ed64c90df2701936cf17ff81842c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec51e513c8f77b22a563f593b2a516d0
SHA1cbac30b633154da5a6f765901029329a3af1d0b9
SHA256d09824719a820bb24e2b873d6fdcbe6c41a291265c0ce6234d02f204b16b696f
SHA512144bcb20e2f47bc581fd5a9760962856704398284f5f75b9706547627c4d9a6dc196c6681a64a0518e3804f41084038a3242858a5fbbf4d3d1f86b01846f4113
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5498fad3775d22c221ebca4260fbbd3f7
SHA17d643a2d7715fbe84e8211434b11cdf0ed6c20b4
SHA256bca3f9580a35667b8c63cf715c915f1b665a3c1fd5ed05f7877a453e6c8a90cc
SHA512b676bcb85f33543ba3339e96a81cc889e5131939691d7c2c30c52d13db4e28de05181e528e9704886256fa019531b320ef538cc95057bc1c72ceea6e14620b18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8af31ad60d1b9a27852512f064b6204
SHA14a1ae78c19880d59c244ab2e59e1a86cd30fc056
SHA256b23319765b7097c5924316e4c82adec6ad9e0c117d9a69bc02a5e2b41682fe9e
SHA51251548b80f4ea99819bb2735f36f4523f4f4b0185e40606c104ce37eefc091a110c7c0dfb1acec371b21e6a43a73e54a383464f09b3591af9215b278efad31d04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d4e21acc3abb85b6517931212b17470
SHA1cf303c446ff8cdddf9808635f7e61a203aeb3902
SHA256a66b8f27d4007129f80a0d7f2a287b5a2ea6e63f1a22fe941457030f02dc7867
SHA512500a3e4b795b0db12b8e5d4b4bbfe108a30a33fe5eb51c7fa9b0a72d8606afe772f7fc99c39ae87d81064972e5d6cab3509e483ec10299763abf29664e0f4ee2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aeaa68302b0771b9ac4a069d6722b767
SHA1e01c715193061d82eb817d373cca37445344ed74
SHA25620b037af4ff895a84f4d44e70281fa8bcc6f045c37b771d23995572570f46d39
SHA512db8e56da07b6e947f3ecd7da67233425133c2286da432b540df0e2a8ea84d148feb3b2362ae64d76fdb1bb155d06a2ea212e8fc6fa060540c139ede8c9c05afb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b